Security analysis of a design variant of randomized hashing

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

At EUROCRYPT 2009, Gauravaram and Knudsen presented an online birthday attack on the randomized hashing scheme standardized in NIST SP800-106. This attack uses a fact that it is easy to find fixed points for the Davies-Meyer-type compression functions of standardized hash functions such as those in the SHA-2 family. This attack is significant in that it is an attack on the target collision resistance (TCR) of the randomized hashing scheme which is claimed to be enhanced TCR (eTCR). TCR is a property weaker than eTCR. In this paper, we will present a randomized hashing scheme called RMC. We will also prove that RMC satisfies both TCR and eTCR in the random oracle model and in the ideal cipher model. In particular, the proof for the TCR security in the ideal cipher model implies that the attack by Gauravaram and Knudsen is not effective against RMC.

Cite

CITATION STYLE

APA

Gauravaram, P., Hirose, S., & Stebila, D. (2017). Security analysis of a design variant of randomized hashing. In Communications in Computer and Information Science (Vol. 719, pp. 14–22). Springer Verlag. https://doi.org/10.1007/978-981-10-5421-1_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free